Static task
static1
Behavioral task
behavioral1
Sample
92858b7198a0a1e37ebb69cb0d611f4adb601f6bbc4b838dc814cea7a8d601fc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
92858b7198a0a1e37ebb69cb0d611f4adb601f6bbc4b838dc814cea7a8d601fc.exe
Resource
win10v2004-20230220-en
General
-
Target
92858b7198a0a1e37ebb69cb0d611f4adb601f6bbc4b838dc814cea7a8d601fc
-
Size
4.3MB
-
MD5
7bfc1da5884363ed8688628c616c43a5
-
SHA1
72d7d1b1d1d5881e1c373cb1a9b38df91ce5fd3b
-
SHA256
92858b7198a0a1e37ebb69cb0d611f4adb601f6bbc4b838dc814cea7a8d601fc
-
SHA512
d1a55fc52df40c542455dacf8371f4d2c015e894deeee9b6501fa293279d8c792e0286c7adaa13bbcffe1fc496e0071bc302f1e1eb06aca43ec63b4f70d3744a
-
SSDEEP
98304:hw/AxspEVqcsJK8JZ9KR7nwVmy301hgr:aAxsQSfMAmN
Malware Config
Signatures
Files
-
92858b7198a0a1e37ebb69cb0d611f4adb601f6bbc4b838dc814cea7a8d601fc.exe windows x64
05944b2749d835d529466691e3e455bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
IoGetCurrentProcess
ObReferenceObjectByHandle
ObfDereferenceObject
PsGetCurrentProcessId
NtBuildNumber
RtlTimeToTimeFields
ExSystemTimeToLocalTime
ZwCreateFile
ZwWriteFile
ZwClose
_snprintf
_vsnprintf
ZwQueryInformationFile
ZwReadFile
strcmp
strncmp
RtlCompareMemory
RtlImageNtHeader
RtlCompareUnicodeString
ExAllocatePoolWithTag
ExFreePoolWithTag
isupper
isdigit
tolower
strlen
_stricmp
strstr
wcscat
wcslen
_wcsicmp
RtlInitAnsiString
RtlQueryRegistryValues
RtlAnsiStringToUnicodeString
RtlCompareUnicodeStrings
ExAllocatePool
MmGetSystemRoutineAddress
PsCreateSystemThread
PsTerminateSystemThread
PsSetCreateProcessNotifyRoutineEx
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
ZwOpenProcess
PsGetProcessPeb
PsGetProcessSessionId
RtlRandomEx
KeBugCheckEx
RtlInitUnicodeString
_stricmp
NtQuerySystemInformation
ZwClose
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
ZwWaitForSingleObject
ZwDeviceIoControlFile
ZwOpenFile
_wcsnicmp
ZwEnumerateKey
ZwCreateEvent
MmGetSystemRoutineAddress
ZwCreateFile
__C_specific_handler
KeSetSystemAffinityThread
KeQueryActiveProcessors
KeQueryTimeIncrement
DbgBreakPointWithStatus
RtlTimeToTimeFields
ExSystemTimeToLocalTime
IoAllocateMdl
IoFreeMdl
MmUnlockPages
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
KeWaitForSingleObject
KeReleaseMutex
KeInitializeMutex
ExFreePoolWithTag
ExAllocatePool
KeRevertToUserAffinityThread
DbgPrint
ExAllocatePool
NtQuerySystemInformation
ExFreePoolWithTag
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
KeQueryActiveProcessors
KeSetSystemAffinityThread
KeRevertToUserAffinityThread
DbgPrint
hal
KeQueryPerformanceCounter
KeQueryPerformanceCounter
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 512KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gg0 Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gg1 Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gg2 Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 376B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ